Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–6 of 6 results for author: Teo, S G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.05174  [pdf, other

    cs.LG cs.AI

    Synthetic Data Aided Federated Learning Using Foundation Models

    Authors: Fatima Abacha, Sin G. Teo, Lucas C. Cordeiro, Mustafa A. Mustafa

    Abstract: In heterogeneous scenarios where the data distribution amongst the Federated Learning (FL) participants is Non-Independent and Identically distributed (Non-IID), FL suffers from the well known problem of data heterogeneity. This leads the performance of FL to be significantly degraded, as the global model tends to struggle to converge. To solve this problem, we propose Differentially Private Synth… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  2. arXiv:2405.00074  [pdf, other

    cs.LG cs.SE

    PAODING: A High-fidelity Data-free Pruning Toolkit for Debloating Pre-trained Neural Networks

    Authors: Mark Huasong Meng, Hao Guan, Liuhuo Wan, Sin Gee Teo, Guangdong Bai, Jin Song Dong

    Abstract: We present PAODING, a toolkit to debloat pretrained neural network models through the lens of data-free pruning. To preserve the model fidelity, PAODING adopts an iterative process, which dynamically measures the effect of deleting a neuron to identify candidates that have the least impact to the output layer. Our evaluation shows that PAODING can significantly reduce the model size, generalize on… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

    Comments: 3 pages

  3. arXiv:2211.13860  [pdf, other

    cs.CR

    Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning

    Authors: Mao V. Ngo, Tram Truong-Huu, Dima Rabadi, Jia Yi Loo, Sin G. Teo

    Abstract: In malware detection, dynamic analysis extracts the runtime behavior of malware samples in a controlled environment and static analysis extracts features using reverse engineering tools. While the former faces the challenges of anti-virtualization and evasive behavior of malware samples, the latter faces the challenges of code obfuscation. To tackle these drawbacks, prior works proposed to develop… ▽ More

    Submitted 24 November, 2022; originally announced November 2022.

    Comments: Accepted for presentation and publication at the 21st International Conference on Applied Cryptography and Network Security (ACNS 2023)

  4. Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective

    Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong

    Abstract: Neural networks have been widely applied in security applications such as spam and phishing detection, intrusion prevention, and malware detection. This black-box method, however, often has uncertainty and poor explainability in applications. Furthermore, neural networks themselves are often vulnerable to adversarial attacks. For those reasons, there is a high demand for trustworthy and rigorous m… ▽ More

    Submitted 11 October, 2022; v1 submitted 24 June, 2022; originally announced June 2022.

  5. arXiv:2204.00783  [pdf, other

    cs.LG cs.CR

    Supervised Robustness-preserving Data-free Neural Network Pruning

    Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Jin Song Dong

    Abstract: When deploying pre-trained neural network models in real-world applications, model consumers often encounter resource-constraint platforms such as mobile and smart devices. They typically use the pruning technique to reduce the size and complexity of the model, generating a lighter one with less resource consumption. Nonetheless, most existing pruning methods are proposed with the premise that the… ▽ More

    Submitted 1 November, 2022; v1 submitted 2 April, 2022; originally announced April 2022.

  6. arXiv:2203.04305  [pdf, other

    cs.LG cs.AI cs.CR

    LSTMSPLIT: Effective SPLIT Learning based LSTM on Sequential Time-Series Data

    Authors: Lianlian Jiang, Yuexuan Wang, Wenyi Zheng, Chao Jin, Zengxiang Li, Sin G. Teo

    Abstract: Federated learning (FL) and split learning (SL) are the two popular distributed machine learning (ML) approaches that provide some data privacy protection mechanisms. In the time-series classification problem, many researchers typically use 1D convolutional neural networks (1DCNNs) based on the SL approach with a single client to reduce the computational overhead at the client-side while still pre… ▽ More

    Submitted 8 March, 2022; originally announced March 2022.